MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 561a8b830e902a0ba18457a0aa8db8a8c663de8ee33e6009f236cedff00f8cbb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Arechclient2


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 561a8b830e902a0ba18457a0aa8db8a8c663de8ee33e6009f236cedff00f8cbb
SHA3-384 hash: b28bf51b899ea5fb7a94da541b72ceb63be737704f0e0abfa0ebd2c9fc0e830271fad68ddd3cf487f4a1d400c882919d
SHA1 hash: fdbad9468075747a4999b7b30fa7cb7b60fdcb4e
MD5 hash: 64be5264f3a58325446865be38c05b34
humanhash: xray-uncle-failed-butter
File name:64be5264f3a58325446865be38c05b34.exe
Download: download sample
Signature Arechclient2
File size:1'462'950 bytes
First seen:2021-03-17 08:20:59 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a1a66d588dcf1394354ebf6ec400c223 (49 x RedLineStealer, 7 x CryptBot, 4 x AZORult)
ssdeep 24576:Z53uhF9SQLLqzkUQrRjlOYvsiEP+tsDirDlmLrgH4tN96yk8ISOm1w+p6njCph5r:Z5+hFsQLLqAllIqsDirDlAOUw+4852Y
Threatray 61 similar samples on MalwareBazaar
TLSH 016512514693A632C4AA22325D11B351D5F5CFE80B0813A7EAC5F02B7FB33E1DA2C9D6
Reporter abuse_ch
Tags:Arechclient2 exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
142
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
64be5264f3a58325446865be38c05b34.exe
Verdict:
Malicious activity
Analysis date:
2021-03-17 08:32:54 UTC
Tags:
trojan autoit

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %AppData% subdirectories
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Launching a process
Sending a UDP request
Creating a process from a recently created file
DNS request
Deleting a recently created file
Using the Windows Management Instrumentation requests
Sending an HTTP GET request
Sending a custom TCP request
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AsataFar RAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Contains functionality to register a low level keyboard hook
Drops PE files with a suspicious file extension
Injects a PE file into a foreign processes
Multi AV Scanner detection for submitted file
Obfuscated command line found
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Drops script at startup location
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Submitted sample is a known malware sample
Tries to harvest and steal browser information (history, passwords, etc)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected AsataFar RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 369915 Sample: vtg3HBN11U.exe Startdate: 17/03/2021 Architecture: WINDOWS Score: 100 61 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->61 63 Multi AV Scanner detection for submitted file 2->63 65 Yara detected AsataFar RAT 2->65 67 Sigma detected: Drops script at startup location 2->67 10 vtg3HBN11U.exe 8 2->10         started        process3 signatures4 87 Contains functionality to register a low level keyboard hook 10->87 13 cmd.exe 1 10->13         started        15 cmd.exe 1 10->15         started        process5 signatures6 18 cmd.exe 3 13->18         started        21 conhost.exe 13->21         started        89 Submitted sample is a known malware sample 15->89 91 Obfuscated command line found 15->91 93 Uses ping.exe to sleep 15->93 95 Uses ping.exe to check the status of other devices and networks 15->95 23 conhost.exe 15->23         started        process7 signatures8 69 Obfuscated command line found 18->69 71 Uses ping.exe to sleep 18->71 25 Custodiva.exe.com 18->25         started        28 PING.EXE 1 18->28         started        31 findstr.exe 1 18->31         started        process9 dnsIp10 85 Drops PE files with a suspicious file extension 25->85 34 Custodiva.exe.com 7 25->34         started        57 127.0.0.1 unknown unknown 28->57 59 192.168.2.1 unknown unknown 28->59 49 C:\Users\user\AppData\...\Custodiva.exe.com, Targa 31->49 dropped file11 signatures12 process13 dnsIp14 51 kcFWRvlAJggwnSDTWdM.kcFWRvlAJggwnSDTWdM 34->51 43 C:\Users\user\AppData\Roaming\...\RegAsm.exe, PE32 34->43 dropped 45 C:\Users\user\AppData\...behaviorgraphRyYpiVyQV.com, PE32 34->45 dropped 47 C:\Users\user\AppData\...behaviorgraphRyYpiVyQV.url, MS 34->47 dropped 73 Writes to foreign memory regions 34->73 75 Injects a PE file into a foreign processes 34->75 39 RegAsm.exe 15 2 34->39         started        file15 signatures16 process17 dnsIp18 53 195.2.78.227, 49720, 54766 VDSINA-ASRU Russian Federation 39->53 55 eth0.me 5.132.162.27, 49722, 80 INTERNEX-ASAT Austria 39->55 77 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 39->77 79 Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines) 39->79 81 Tries to harvest and steal browser information (history, passwords, etc) 39->81 83 Queries memory information (via WMI often done to detect virtual machines) 39->83 signatures19
Threat name:
Win32.Trojan.Bingoml
Status:
Malicious
First seen:
2021-03-17 08:21:21 UTC
AV detection:
9 of 47 (19.15%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Runs ping.exe
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Looks up external IP address via web service
Drops startup file
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
d3c16112a56249d394c34134e71a6860fba98098f013a84557ba6159e18973d8
MD5 hash:
826f97c7a24ccc418601f78c35ea1f8b
SHA1 hash:
a23ac15198ead14b2040f248ce0335561f65d133
SH256 hash:
561a8b830e902a0ba18457a0aa8db8a8c663de8ee33e6009f236cedff00f8cbb
MD5 hash:
64be5264f3a58325446865be38c05b34
SHA1 hash:
fdbad9468075747a4999b7b30fa7cb7b60fdcb4e
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Arechclient2

Executable exe 561a8b830e902a0ba18457a0aa8db8a8c663de8ee33e6009f236cedff00f8cbb

(this sample)

  
Delivery method
Distributed via web download

Comments